¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2022-12-19
1¡¢¸çÂ×±ÈÑÇÄÜÔ´¹©Ó¦ÉÌEPMÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå12ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¸çÂ×±ÈÑÇÄÜÔ´¹«Ë¾Empresas P¨²blicas de Medell¨ªn(EPM)Ôâµ½ÁËBlackCat/ALPHVµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬¹«Ë¾ÔËÓªÔÝʱÖÐÖ¹¡£¡£¡£ ¡£EPMÊǸçÂ×±ÈÑÇ×î´óµÄ¹«¹²ÄÜÔ´¡¢Ë®ºÍ×ÔÈ»Æø¹©Ó¦ÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬ÔÚ2022Äê´´Á¢ÁËÁè¼Ý250ÒÚÃÀÔªµÄÊÕÈë¡£¡£¡£ ¡£ÉÏÖܶþ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒªÇóÔ¼4000ÃûÔ±¹¤¾Ó¼ÒÊÂÇ飬£¬£¬£¬£¬£¬ÇÒIT»ù´¡Éèʩ̱»¾£¬£¬£¬£¬£¬£¬¹«Ë¾µÄÍøÕ¾Ò²²»ÔÙ¿ÉÓᣡ£¡£ ¡£½øÒ»²½µÄÊÓ²ìÅú×¢£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜÒÑ´ÓEPMÇÔÈ¡ÁË´ó×ÚÊý¾Ý¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/


2¡¢²¿·ÖÓû§×°ÖÃWindows 10¸üкó»á·ºÆðÀ¶ÆÁËÀ»úÎÊÌâ

      

¾Ý12ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÕë¶ÔWindows 10×°±¸µÄ¸üпÉÄܻᵼÖÂÀ¶ÆÁËÀ»ú¹ýʧ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ú¹ÊͳÆËüÒѾ­ÔÚ¾ÙÐÐÐÞ¸´¡£¡£¡£ ¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬×°ÖÃKB5021233ºó£¬£¬£¬£¬£¬£¬²¿·ÖWindows×°±¸Æô¶¯Ê±¿ÉÄÜ·ºÆð¹ýʧ£¨0xc000021a£©ÒÔ¼°À¶ÆÁ¡£¡£¡£ ¡£ÊÇÓÉÓÚ×°Öøüк󣬣¬£¬£¬£¬£¬c:/windows/system32ºÍc:/windows/system32/driversÖеÄhidparse.sysÎļþ°æ±¾¿ÉÄܲ»Æ¥Å䣬£¬£¬£¬£¬£¬µ¼ÖÂÕûÀíʱÊðÃûÑé֤ʧ°Ü¡£¡£¡£ ¡£¸Ã¹«Ë¾ÒÑÌṩ»º½â·½·¨£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§²»ÒªÊµÑéÆäËüÐÞ¸´ÒªÁ죬£¬£¬£¬£¬£¬ÀýÈçɾ³ýhidparse.sys£¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜ»áÍêÈ«ÆÆËðÅÌËã»ú¡£¡£¡£ ¡£Î¢ÈíÏÖÔÚÕý×ÅÊÖ½â¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬Ã»ÓÐÔ¤¼ÆÍê³Éʱ¼ä¡£¡£¡£ ¡£


https://news.softpedia.com/news/microsoft-warns-of-windows-10-bsods-after-the-latest-updates-536675.shtml


3¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý

      

ýÌå12ÔÂ17Èճƣ¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍøÉϳöÊÛÓ¡¶ÈÒßÃç½ÓÖÖÍøÕ¾CoWIN.gov.inµÄÊý¾Ý¡£¡£¡£ ¡£Æ¾Ö¤Ñù±¾Îļþ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñй¶ÁËÓû§ID¡¢Ñù±¾ID¡¢ÐÕÃû¡¢ÊÖ»úºÅÂëºÍЧ¹ûÈÕÆÚµÈÐÅÏ¢¡£¡£¡£ ¡£ºÚ¿ÍÔÚÒ»¸öÌû×ÓÖÐÉù³ÆÇÔÈ¡ÁË5000¸öÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬µ«ÔÚÁíÒ»¸öÌû×ÓÖÐ˵Ëû¿ÉÒÔ»á¼ûÁè¼Ý50Íò¸öÕË»§¡£¡£¡£ ¡£Êý¾ÝµÄÕæÊµÐÔÏÖÔÚ»¹Ã»Óб»Ö¤Êµ£¬£¬£¬£¬£¬£¬È»¶øºÚ¿ÍËÆºõÖ»ÄÜ»á¼ûAndra Pradesh CoWINÃÅ»§µÄÆäÖÐÒ»¸öÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬£¬£¬¶ø·Çϵͳ×Ô¼º¡£¡£¡£ ¡£


https://www.timesnownews.com/technology-science/hackers-selling-user-data-from-cowin-platform-on-darkweb-article-96301909/amp


4¡¢É罻ýÌåÆÊÎöÍøÕ¾Social BladeÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

      

¾Ý12ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬É罻ýÌåÆÊÎöÍøÕ¾Social Blade³ÆÆäÓû§µÄÐÅÏ¢Òѱ»Ð¹Â¶¡£¡£¡£ ¡£¸Ã¹«Ë¾Ã»ÓоʹËÊÂÎñ·¢³ö¹ûÕæÍ¨¸æ£¬£¬£¬£¬£¬£¬¶øÊÇÖ±½Óͨ¹ýÓʼþ֪ͨÓû§¡£¡£¡£ ¡£ÓʼþÖÐдµ½£¬£¬£¬£¬£¬£¬12ÔÂ14Èոù«Ë¾ÊÕµ½ÁËDZÔÚÊý¾Ýй¶µÄ֪ͨ£¬£¬£¬£¬£¬£¬¾ÝϤºÚ¿ÍÇÔÈ¡ÁËÆäÓû§Êý¾Ý¿â²¢ÊÔͼÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£ ¡£Ñù±¾ÒÑÐû²¼£¬£¬£¬£¬£¬£¬¾­Ö¤ÊµÊý¾ÝȷʵÊÇÕæÊµµÄ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÁËÍøÕ¾ÉϵÄÎó²îÀ´·ÃÊý¾Ý¿â¡£¡£¡£ ¡£Social Blade³Æ£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«°üÀ¨µç×ÓÓʼþ¡¢IPºÍ¼ÒÍ¥µØµã£¬£¬£¬£¬£¬£¬ÒÔ¼°ÃÜÂëµÄ¹þÏ£Öµ¡£¡£¡£ ¡£


https://www.infosecurity-magazine.com/news/social-blade-confirms-data-breach/


5¡¢Nozomi·¢Ã÷¶ñÒâÈí¼þGluptebaÔÚÈ«Çò¹æÄ£ÄڵĹ¥»÷»î¶¯

      

NozomiÔÚ12ÔÂ15ÈÕ³ÆÆä·¢Ã÷ÁËGluptebaÔÚ¿ìÒªÒ»ÄêµÄÖÐÖ¹ºóÖØÐ»îÔ¾ÆðÀ´£¬£¬£¬£¬£¬£¬Ñ¬È¾ÁËÈ«ÇòµÄ×°±¸¡£¡£¡£ ¡£2021Äê12Ô£¬£¬£¬£¬£¬£¬¹È¸èÀÖ³ÉµØÆÆËðÁËÕâ¸öÖ§³ÖÇø¿éÁ´µÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬»ñµÃÁË¿ØÖƽ©Ê¬ÍøÂç»ù´¡ÉèÊ©µÄ·¨ÔºÏÂÁ£¬£¬£¬£¬£¬²¢¶ÔÁ½¸ö¶íÂÞ˹ÔËÓªÍÅ»ïÌáÆðËßËÏ¡£¡£¡£ ¡£Nozomi½üÆÚµÄÊÓ²ìÈ·¶¨ÁË4ÆðGlupteba¹¥»÷»î¶¯ÖÐʹÓõÄ15¸ö±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬×î½üÒ»´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£ ¡£ÓëÒÑÍùÏà±È£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯Ê¹ÓÃÁ˸ü¶àµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬Ê¹½©Ê¬ÍøÂç¸ü¾ßµ¯ÐÔ¡£¡£¡£ ¡£


https://www.nozominetworks.com/blog/tracking-malicious-glupteba-activity-through-the-blockchain/


6¡¢Î¢ÈíÐû²¼¹ØÓÚеÄDDoS½©Ê¬ÍøÂçMCCrashµÄÆÊÎö±¨¸æ

      

12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪMCCrashµÄÐÂÐÍ¿çÆ½Ì¨¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚѬȾWindows¡¢LinuxºÍÎïÁªÍø×°±¸£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¶ÔMinecraftЧÀÍÆ÷¾ÙÐÐDDoS¹¥»÷¡£¡£¡£ ¡£½©Ê¬ÍøÂçµÄ³õʼѬȾǰÑÔÊÇαÔìµÄWindowsÔÊÐíÖ¤µÄÆÆ½â¹¤¾ß£¬£¬£¬£¬£¬£¬Ò»µ©ËüѬȾÁË×°±¸£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âSSHƾ֤Èö²¥µ½ÍøÂçÉÏµÄÆäËüϵͳ¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬´ó´ó¶¼±»MCCrashѬȾµÄ×°±¸Î»ÓÚ¶íÂÞ˹£¬£¬£¬£¬£¬£¬Æä´ÎÄ«Î÷¸ç¡¢Òâ´óÀûºÍÓ¡¶ÈµÈµØ¡£¡£¡£ ¡£


https://www.microsoft.com/en-us/security/blog/2022/12/15/mccrash-cross-platform-ddos-botnet-targets-private-minecraft-servers/